Abstract

Authentication has become a necessity these days because the use in most of the life applications from accounts to devices, especially with the rapid development of technology versus traditional methods such as password and PIN, that is, become infeasible for such methods. New methods have emerged, including biometric systems. In this paper we will explore the possibility of combining cryptography with biometrics in order to achieve authentication. EEG will be used as they are unique and also difficult to expose and copy of 9 healthy persons, extracting features from them and use that features with fuzzy vault scheme to provide high security to encrypt Biometric systems. the calsssification gives good accuracy 96% , and using the tent chaff points give the system an advantage because it reduces the error occurs when separates chaff points from the genuine point which are the EEG signal features because the initial seeds are known by both sender and receiver.

Highlights

  • User authentication is an important phase in security systems

  • EEG signals are dynamic, sensitive, and inexpensive and used to observe mental state that can be used to distinguish persons. These signals can be bound with a cryptography to empower the security, a scheme that can be used with brain wave signals is called fuzzy vault scheme, keybased cryptographic scheme uses error correction codes to generate polynomials to secure the key

  • Marcel and Millan [11] investigate the use of brain activity for person authentication, using a statistical framework based on Gaussian Mixture Models and Maximum a posteriori model adaptation

Read more

Summary

Introduction

User authentication is an important phase in security systems. Authentication is the determining process of a person is really, who claimed to be. Authentications can be according to their use: password-based, tokenbased, and biometrics-based. Biometrics systems based on human being’s measurements analyze statistic aspects of unique physical and behavioral characteristics, which can be consumed to identify or verify a human [2]. Without the drawbacks of both passwords-based and biometric-based, the EEG-based biometric authentication system combines their advantages [1]. EEG signals are dynamic, sensitive, and inexpensive and used to observe mental state that can be used to distinguish persons. These signals can be bound with a cryptography to empower the security, a scheme that can be used with brain wave signals is called fuzzy vault scheme, keybased cryptographic scheme uses error correction codes to generate polynomials to secure the key

Biometric concept
Electroencephalogram (EEG)
Motor imagery (MI)
EEG person authentication
Fuzzy vault
Combining cryptography with EEG signals
Problem statement
EEG dataset
Extraction of EEG trials
Artifact’s reduction
Bandpass filtering
Feature extraction
Model building
Lock the vault
2.10 Tent-chaff points
Chx1 Chy1 3
2.11 Unlock the vault
2.12 Lagrange interpolation
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call